NIST Distributes Mobile Device Security Guide


One constant concern for IT departments overseeing technology for sizable telecommuting workforces is the unknowns that come with employees accessing the corporate network with their own devices. With remote work carrying on for the foreseeable future, the National Institute of Standards and Technology has shared draft guidance for enterprise bring-your-own-device policies.  

This guidance is designed to provide system administrators with a standards-based approach and need tool for the privacy and security of personally owned mobile devices accessing enterprise resources 

Entitled the Mobile Device Security: Bring Your Own Device (BYOD) practice guide, the draft gives admins an example solution for creating a standards-based approach and insight into commercially available technologies to meet privacy and security needs of mobile devices.  

The guidance focuses on the challenges brought by BYOD mobile devices as well as the solutions and benefits of securing this environment. The National Cybersecurity Center of Excellence partnered with the mobile device community and cybersecurity technology providers to build a simulated BYOD environment for this study. Through this environment, the organizations produced an example for administrators to follow when securing their organization’s BYOD infrastructure.  

The example solution uses technologies and security capabilities from the project collaborators, and the technologies used in the solution support security and privacy standards and guidelines. These guidelines include the NIST Cybersecurity Framework and NIST Privacy Framework.  

Even with help from the NCCoE and NIST, properly implementing a BYOD policy that safely protects your organization is a huge task. There’s no need to tackle it on your own. Partner with 2W Tech and take advantage of our Cybersecurity Compliance Program. Contact us today to learn more.  

Read More:

Microsoft Azure Availability Zones Expanded to More Regions

Common ERP Mistakes During Implementation Process

Back to IT News